Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Splunk-New-Microsite-logo.png
Splunk

Orchestration & Automation for Lockheed Martin


Event Date: September 23, 2020
Hosted By: Splunk & Carahsoft

Security and IT Ops teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk gives you the full power of orchestration, automation, and response to executing actions in seconds, not hours. 

Participants joined us to learn how Splunk Phantom can help your team achieve optimum security and IT operations regardless of what security tools or SIEM you're using. Through Splunk Phantom, users will be able to leverage technology for orchestration and automation as an integral part of their Security Operations Center (SOC) platform to accelerate incident response while addressing the skills shortage.

During the webinar, attendees:

  • Got an overview and introduction to Orchestration and Automated Response (OAR)
  • Saw a demonstration of Splunk’s OAR solution as it could be applied to Lockheed Martin’s technology
  • Learned about best practices for achieving OAR success
  • Participated in a question and answer session

Fill out the form below to view this archived event.


Resources


Featured

In this episode of Identiholics, host Christine Owen is joined by Jamie Danker from Venable and Carole House from Terranet. They discuss the importance of women in the cybersecurity field and the need for more women to be involved in privacy and security discussions. The conversation highlights the ...

The discourse around secure mobile communication platforms has escalated in the United States public sector, where security and data integrity aren’t just priorities but mandates. As agencies become increasingly dependent on digital technologies to execute their missions, the need for secure p...

Collibra has been named a Leader in The Forrester Wave™: Data Governance Solutions, Q3 2025 report, recognized for its strong vision and comprehensive capabilities. Download the report to explore emerging trends, evaluation criteria for governance tools, and why Collibra stands out in today&rs...

Ready to fast-track your implementation? The Road to Go-Live Handbook reveals proven strategies, expert tips, and step-by-step guidance to help you launch with confidence and deliver results faster. View this essential playbook for turning process insights into real business impact—download no...

Government agencies are facing increasing demands to provide services more efficiently, transparently, and with limited resources. To support this transformation, we're thrilled to share that Accela has acquired ePermitHub—marking a significant advancement in streamlining permitting and pl...

The Wiz + Accenture Responsive Protection System — a modern, unified cloud security platform tailored for federal agencies. A simple and secure way to enhance cloud security while reducing costs.

This resource provides an overview of EdgeRunner AI, a military-specific AI solution offering capabilities such as offline, multi-step, multi-turn interactions tailored for warfighters. It highlights features like EdgeRunner Athena for document summarization and domain-specific adapters with LoRA fi...

Access this Cohesity eBook to uncover six key predictions shaping the future of AI, data security, and cloud. As AI rapidly transforms industries, it brings both opportunities and risks—Cohesity experts provide actionable insights to help you stay ahead. Explore practical takeaways and valuabl...

This Alteryx and Cloudera resource highlights their joint solution for seamless data integration, advanced analytics, and scalable machine learning. It emphasizes key benefits such as efficient data processing, secure collaboration, and regulatory compliance, helping businesses optimize decision-mak...

This article discusses the nature of how cybercriminals attack, from the inside! Cybercriminals use legitimate platforms to infiltrate your data. CyberFOX goes into detail on how you can stop these attacks from surfacing,